Over the past few decades, the automotive industry was mostly focused on testing the safety aspects of a vehicle. However, this was not the case with security testing as it only began to be addressed recently. As a result, multiple approaches applying various security testing techniques on different software-based vehicle IT components emerged. With that said, the research and practice lack an overview about these techniques. In this paper, we conduct a systematic mapping study. This involved the investigation on the following five dimensions: (1) security testing techniques, (2) AUTOSAR layers, (3) functional interfaces of AUTOSAR, (4) vehicle lifecycle phases and (5) attacks. In total, 39 papers presenting approaches for security testing in automotive engineering were systematically selected and classified. The results identify multiple security testing techniques focusing on early phases of vehicle life cycle through the application and services layer of the AUTOSAR architecture. Finally, there is a need for security regression testing approaches, as well as combined security and safety testing approaches.
Today's industrial automation systems are undergoing a digital transformation that implies a shift towards the Internet of Things (IoT), leading to the Industrial Internet of Things (IIoT) paradigm. Existing Industrial Automated Control Systems (IACS), enriched with a potentially large number of IoT devices are expected to make systems more efficient, flexible, provide intelligence, and ultimately enable autonomous control. In general, the majority of such systems come with high level of criticality that calls for well-established methods and approaches when achieving cybersecurity, preferably prescribed by a standard. IEC 62443 is an industrial standard that provides procedures to manage risks related to cybersecurity threats in IACS. Given the new IIoT paradigm, it is likely that existing standards are not sufficiently aligned with the challenges related to developing and maintaining cybersecurity in such systems. In this paper we review the applicability of the IEC 62443 standard in IIoT contexts and discuss potential challenges the process owners might encounter. Our analysis underlines that some areas within the standard could prove difficult to reach compliance with. In particular, handling of cross zone communication and software updates require additional guidance.
Today's industrial automation systems are undergoing a digital transformation that implies a shift towards the Internet of Things (IoT), leading to the Industrial Internet of Things (IIoT) paradigm. Existing Industrial Automated Control Systems (IACS), enriched with a potentially large number of IoT devices are expected to make systems more efficient, flexible, provide intelligence, and ultimately enable autonomous control. In general, the majority of such systems come with high level of criticality that calls for well-established methods and approaches when achieving cybersecurity, preferably prescribed by a standard. IEC 62443 is an industrial standard that provides procedures to manage risks related to cybersecurity threats in IACS. Given the new IIoT paradigm, it is likely that existing standards are not sufficiently aligned with the challenges related to developing and maintaining cybersecurity in such systems. In this paper we review the applicability of the IEC 62443 standard in IIoT contexts and discuss potential challenges the process owners might encounter. Our analysis underlines that some areas within the standard could prove difficult to reach compliance with. In particular, handling of cross zone communication and software updates require additional guidance.
Abstract The brainstem is a less-common location for ependymomas than the spinal cord where they are the most common adult intramedullary tumor.1-18 In this first video case report in the peer-reviewed literature, we demonstrate microsurgical resection of a medulla oblongata ependymoma. There are several case reports of medulla oblongata ependymomas1,3,5,6,13 and a few series of spinal cord ependymomas that included cases of ependymomas of the cervicomedullary junction.9,10 The goal of surgery was to stabilize the preoperative neurological function; favorable outcome is achieved in patients with good preoperative statuses and well-defined tumor boundaries.9 Although gross total resection (GTR) provides the best overall outcome, it is most effective for classic grade II tumors, but not grade I (myxopapillary) and ependymomas, which have a lower GTR rate.14,15 A 55-yr-old patient developed 4-extremity weakness and dysphagia. Pre-/postcontrast magnetic resonance imaging (MRI) revealed centrally located brainstem lesion situated at the lower half of the medulla oblongata. Surgery, performed by the senior author, was performed in the prone position with a small suboccipital craniectomy and C1 posterior arch removal, followed by pia opening and posterior midline myelotomy. Tumor was debulked, dissected from the white matter, and resected. Histology revealed ependymoma (World Health Organization grade II). Postoperative pre-/postcontrast MRI revealed total resection. The patient's neurological deficit completely resolved postoperatively. Written consent was obtained from the patient.
The crisis of state cultural institutions in Bosnia and Herzegovina that started in 2010 peaked with the closure of the National Museum in 2012. The crisis exposed the fragmentation that was taking place within Sarajevo’s cultural elite and the increasing gap between the former state cultural institutions and the civil sector. This paper examines the entanglement between the memory of the siege of Sarajevo and the fractioning within Sarajevo’s cultural elite through Pierre Bourdieu’s concept of cultural capital and social distinctions, using the examples of the National Museum of Bosnia and Herzegovina and the Sarajevo Film Festival.
The atomic force microscope empowers research into nanoscale structural and functional material properties. Recently, the scope of application has broadened with the arrival of conductance tomography, a technique for mapping current in three-dimensions in electronic devices by gradually removing sample material with the scanning probe. This technique has been valuable in studying resistance switching memories and solar cells, although its broader use has been hindered by a lack of understanding of its reliability and practicality. Implementation can be preclusive, owing to difficulties in characterizing tip-sample interactions and accounting for probe degradation, both of which are crucial factors in process efficacy. This work follows the existing conductance tomography literature, presenting an insight into the repeatability and reliability of the material removal processes. The consistency of processes on a hard oxide and a softer metal are investigated, to understand the critical differences in etching behavior that might affect tomography measurements on heterostructures. Individual probe behavior stabilizes following a wearing-in stage and etching processes are consistent between probes, in particular on oxide. However, process inconsistency increases with applied force on metal. The effects of scan angle, tip speed and feedback gain are therefore explored and their tuning found to improve the spatial consistency of material removal. With these findings, we aim to present a critical study of the implementation of tomography with the atomic force microscope in order to contribute to its methodological development.
We consider the exchange market models with divisible goods where the demands of the agents satisfy the weak gross substitutes (WGS) property. This is a well-studied property, in particular, it gives a sufficient condition for the convergence of the classical tatonnement dynamics. In this paper, we present a simple auction algorithm that obtains an approximate market equilibrium for WGS demands. Such auction algorithms have been previously known for restricted classes of WGS demands only. As an application of our result, we obtain an efficient algorithm to find an approximate spending-restricted market equilibrium for WGS demands, a model that has been recently introduced as a continuous relaxation of the Nash Social Welfare problem.
Recent publications have suggested that high-resolution cervical auscultation (HRCA) signals may provide an alternative non-invasive option for swallowing assessment. However, the relationship between hyoid bone displacement, a key component to safe swallowing, and HRCA signals is not thoroughly understood. Therefore, in this work we investigated the hypothesis that a strong relationship exists between hyoid displacement and HRCA signals. Videofuoroscopy data was collected for 129 swallows, simultaneously with vibratory/acoustic signals. Horizontal, vertical and hypotenuse displacements of the hyoid bone were measured through manual expert analysis of videofluoroscopy images. Our results showed that the vertical displacement of both the anterior and posterior landmarks of the hyoid bone was strongly associated with the Lempel-Ziv complexity of superior-inferior and anterior-posterior vibrations from HRCA signals. Horizontal and hypotenuse displacements of the posterior aspect of the hyoid bone were strongly associated with the standard deviation of swallowing sounds. Medial-Lateral vibrations and patient characteristics such as age, sex, and history of stroke were not significantly associated with the hyoid bone displacement. The results imply that some vibratory/acoustic features extracted from HRCA recordings can provide information about the magnitude and direction of hyoid bone displacement. These results provide additional support for using HRCA as a non-invasive tool to assess physiological aspects of swallowing such as the hyoid bone displacement.
Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!
Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo
Saznaj više